After some research, I didn't find any solutions. So I post here.
My goal: redirected the HTTPs traffic from my custom program to BurpSuite in order to analyse the server response and debug my program.
- I have Debian 4.4.3
- I have two network interfaces : eth0 and tap0, I work on tap0.
- I have a php program that just send an HTTPS request to a local server (tap0). My php code use CURL to send the request (curl_init(), curl_setopt() etc.)
In a debugging goal, I have thought to send my flows via BurpSuite in order to see the HTTPS requests. So:
- I launch Burp that listen on all interfaces port 8080
I configure /etc/proxychains.conf and in my ProxyList there are:
socks4 127.0.0.1 8080 socks5 127.0.0.1 8080 socks4 XX.XX.XX.217 8080 socks5 XX.XX.XX.217 8080
And when I use proxychains:
prochychains php myProgramme.php
My program is executed but proxychains doesn't "proxify" the flow and so Burp doesn't see nothing...
I think that's because I am in my local network ?
What do you think about the best solution to intercept and see the HTTPS flows to my php program ?